Covert Channels-based Stealth Attacks in Industry 4.0
| dc.centro | E.T.S.I. Informática | es_ES |
| dc.contributor.author | Alcaraz-Tello, María Cristina | |
| dc.contributor.author | Bernieri, Giuseppe | |
| dc.contributor.author | Pascucci, Federica | |
| dc.contributor.author | Lopez, Javier | |
| dc.contributor.author | Setola, Roberto | |
| dc.date.accessioned | 2025-01-15T10:35:42Z | |
| dc.date.available | 2025-01-15T10:35:42Z | |
| dc.date.issued | 2019-05-15 | |
| dc.departamento | Instituto de Tecnología e Ingeniería del Software de la Universidad de Málaga | |
| dc.description.abstract | Industry 4.0 advent opens several cyber-threats scenarios originally designed for classic information technology, drawing the attention to serious risks for the modern industrial control networks. To cope with this problem, in this paper we address the security issues related to covert channels applied to industrial networks, identifying the new vulnerability points when information technologies converge with operational technologies such as edge computing infrastructures. Specifically, we define two signaling strategies where we exploit the ModbusTCP protocol as target to set up a covert channel. Once the threat channel is established, passive and active offensive methodologies are further exploited by implementing and testing them on a real Industrial Internet of Things testbed. The experimental results highlight the potential damage of such specific threats and the easy extrapolation of the attacks to other types of channels in order to show the new risks for the Industry 4.0. Related to this, we discuss some countermeasures offering an overview of possible mitigation and defensive measures. | es_ES |
| dc.identifier.citation | C. Alcaraz, G. Bernieri, F. Pascucci, J. Lopez and R. Setola, "Covert Channels-Based Stealth Attacks in Industry 4.0," in IEEE Systems Journal, vol. 13, no. 4, pp. 3980-3988, Dec. 2019, doi: 10.1109/JSYST.2019.2912308 | es_ES |
| dc.identifier.doi | 10.1109/JSYST.2019.2912308 | |
| dc.identifier.uri | https://hdl.handle.net/10630/36355 | |
| dc.language.iso | eng | es_ES |
| dc.publisher | IEEE Xplore | es_ES |
| dc.rights.accessRights | open access | es_ES |
| dc.subject | Seguridad informática | es_ES |
| dc.subject.other | Stealth attacks | es_ES |
| dc.subject.other | Covert channel | es_ES |
| dc.subject.other | Industry 4.0 | es_ES |
| dc.subject.other | Data exfiltration | es_ES |
| dc.subject.other | Command and control | es_ES |
| dc.title | Covert Channels-based Stealth Attacks in Industry 4.0 | es_ES |
| dc.type | journal article | es_ES |
| dc.type.hasVersion | AM | es_ES |
| dspace.entity.type | Publication | |
| relation.isAuthorOfPublication | 7e0ebfca-cab9-4146-9e5b-d06a1ce3d7eb | |
| relation.isAuthorOfPublication.latestForDiscovery | 7e0ebfca-cab9-4146-9e5b-d06a1ce3d7eb |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Covert Channels based Stealth Attacks in I40.pdf
- Size:
- 998.15 KB
- Format:
- Adobe Portable Document Format
- Description:

